The following publications are possibly variants of this publication:
- Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve CryptographyYan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. cryptography, 8(1):11, March 2024. [doi]
- A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public KeyYi Zhang, Tianxi Cui, Hong Tang. npc 2008: 336-340 [doi]
- FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with NoiseChenglu Jin, Charles Herder, Ling Ren 0001, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk. cryptography, 1(3):23, 2017. [doi]